Ransomware, business email compromises and the malicious insider threat: These are the three top concerns of Canadian attorney Imran Ahmad as he looks ahead to the cybersecurity legal landscape in 2020.
We caught up with Ahmad at our Toronto Cybersecurity Summit in September. Among the insights he shared: The rise of...
As breaches become more commonplace in India, law enforcement agencies are leveraging new technologies to assist in investigations. This edition of CyberEd APAC features an interview with Brijesh Singh, inspector general of police for cyber in Maharashtra, who outlines the challenges in investigating breaches and the...
With new threats targeting the nation's critical infrastructure, partnerships among government and private-sector security professionals are more critical than ever, says Brian Harrell of the U.S. Cybersecurity and
Infrastructure Security Agency. Harrell was a featured speaker at ISMG's recent Cybersecurity Summit in...
Medical device security: Awareness of this significant challenge has grown dramatically over the past few years. But Michael McNeil, global security officer at device manufacturer Philips, argues that cybersecurity is
still years behind where it should be, so stakeholders are playing catch-up.
McNeil spoke recently...
Where is the data? Who has access to it? How is it being secured? These are the fundamental questions inherent in any third-party risk management program. And in this edition of CyberEd Magazine, Cris Ewell, CISO of UW Medicine, shares insights from his experience managing vendor risk. Ewell's single biggest message:...
It's been nearly seven years since HSBC was fined $1.9 billion by U.S. authorities for money laundering violations involving international drug cartels. But Everett Stern, the former employee who blew the whistle on the bank, continues to tell his story because he believes similar criminal activity is ongoing. And he...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
From the days of Rosie the Riveter, women have been closing the ranks in the disparity in gender in the workplace. Why, then, do women in the tech sector lag woefully behind?
Ann Sung Ruckstahl, senior vice president and chief marketing officer for Unisys, recently discussed the challenges "We're still in the middle...
Why trust a former black hat? Hector Monsegur, a former member of LulzSec, discusses why his unique perspective is so valuable.
"Cybersecurity is a young industry that's starting to spread awareness and starting to really develop organizations' security postures," he says. "It's good that we have general awareness....
We've talked a lot in recent times about data breaches and data loss. But what about pure data integrity - not just whether it can be stolen, but whether it can be secretly altered?
This is a topic close to the heart of Diana Kelley, a cybersecurity field CTO for Microsoft. She has addressed the topic at recent ISMG...
GDPR. NIST CSF. NY DFS. These acronym laws and standards can be maddening to navigate clearly for legal and compliance teams. Particularly when the threat landscape is ever evolving, and the threat actors - from outside and within - are unrelenting. This is why we have designed these sessions as an opportunity for...
This month we spotlight the critical cybersecurity challenges facing healthcare sector organization. Explore why a focus on compliance-driven security risk programs can put entities at a great disadvantage in dealing with these challenges - and what's needed to implement a more war-minded approach to battle the...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features the world's first CISO, Stephen Katz, discussing how the role of the modern CISO has evolved. Another key influencer, Gartner's Avivah Litan, discusses the lure of blockchain. This edition...
In the wake of digital transformation and several large, high-profile data breaches - and at a time where all the personal information is shared in the social network - traditional forms of digital identity verification are no longer valid.
Ninety-six percent of polled security leaders say that a frictionless...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.